nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#hacking

140 Beiträge63 Beteiligte4 Beiträge heute
Hackaday<p>Rockbox 4.0 Released</p><p>It’s traditional to launch new software on April Fool’s Day, which is when we heard that Rockbox 4.0 has been released. But, in this case, the venerable MP3 firmware actually …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/rockbox-4-0-released/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/rockbo</span><span class="invisible">x-4-0-released/</span></a></p>
Marcel SIneM(S)US<p>Leak mit vielen Interna: <a href="https://social.tchncs.de/tags/4chan" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4chan</span></a> nach Hackerangriff offline gegangen | heise online <a href="https://www.heise.de/news/Leak-mit-vielen-Interna-4chan-nach-Hackerangriff-offline-gegangen-10353492.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Leak-mit-vielen-</span><span class="invisible">Interna-4chan-nach-Hackerangriff-offline-gegangen-10353492.html</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberCrime</span></a></p>
Pyrzout :vm:<p>Attackers exploited SonicWall SMA appliances since January 2025 – Source: securityaffairs.com <a href="https://ciso2ciso.com/attackers-exploited-sonicwall-sma-appliances-since-january-2025-source-securityaffairs-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/attackers-exploi</span><span class="invisible">ted-sonicwall-sma-appliances-since-january-2025-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/sonicwall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sonicwall</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Hackaday<p>Frankenflair 58: Manual Roots, Advanced Brew</p><p>The user interface of things we deal with often makes or breaks our enjoyment of using a device. [Janne] from Fraktal thinks so, he has an espresso machine he enjoys …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/frankenflair-58-manual-roots-advanced-brew/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/franke</span><span class="invisible">nflair-58-manual-roots-advanced-brew/</span></a></p>
Hackaday<p>China’s TMSR-LF1 Molten Salt Thorium Reactor Begins Live Refueling Operations</p><p>Although uranium-235 is the typical fuel for commercial fission reactors on account of it being fissile, it’s relatively rare relative to the fertile U-238 and thorium (Th-232). Using either of …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/chinas-tmsr-lf1-molten-salt-thorium-reactor-begins-live-refueling-operations/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/chinas</span><span class="invisible">-tmsr-lf1-molten-salt-thorium-reactor-begins-live-refueling-operations/</span></a></p>
Pyrzout :vm:<p>Hacking US crosswalks to talk like Zuck is as easy as 1234 – Source: go.theregister.com <a href="https://ciso2ciso.com/hacking-us-crosswalks-to-talk-like-zuck-is-as-easy-as-1234-source-go-theregister-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/hacking-us-cross</span><span class="invisible">walks-to-talk-like-zuck-is-as-easy-as-1234-source-go-theregister-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/TheRegisterSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheRegisterSecurity</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/TheRegister" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TheRegister</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Hackaday<p>They Hacked a Nuclear Power Plant! Whoops! Don’t Make a Sound!</p><p>What do you do with an unused nuclear reactor project? In Washington, one of them was hacked to remove sound, all in the name of science. In 1977, a little …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/they-hacked-a-nuclear-power-plant-whoops-dont-make-a-sound/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/they-h</span><span class="invisible">acked-a-nuclear-power-plant-whoops-dont-make-a-sound/</span></a></p>
Y⃒̸̷̝̜̙ͥͥͥngmar<p>This axe seems to feature a anti-fling safety device. It works. The head is completely lose, but doesn't fly off because that metal strip is nailed to the handle and bent over on the top so the head can't fly off all the way, just rattle around :)</p><p>Top notch farm equipment! 👍 </p><p><a href="https://social.tchncs.de/tags/Axe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Axe</span></a> <a href="https://social.tchncs.de/tags/Tools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tools</span></a> <a href="https://social.tchncs.de/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a></p>
securityaffairs<p>Attackers exploited <a href="https://infosec.exchange/tags/SonicWall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SonicWall</span></a> <a href="https://infosec.exchange/tags/SMA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SMA</span></a> appliances since January 2025<br><a href="https://securityaffairs.com/176706/security/attackers-exploited-sonicwall-sma-appliances-since-january-2025.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176706/sec</span><span class="invisible">urity/attackers-exploited-sonicwall-sma-appliances-since-january-2025.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Hackaday<p>Hydroplaning RC Jet boat Steers Clear of Convention</p><p>[CoraConcepts], who has a background in motorsports, has been busy designing an unconventional radio-controlled watercraft she calls the HydraJet. There are two key design decisions that make the HydraJet what …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/hydroplaning-rc-jet-boat-steers-clear-of-convention/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/hydrop</span><span class="invisible">laning-rc-jet-boat-steers-clear-of-convention/</span></a></p>
Hackaday<p>Vibing, AI Style</p><p>This week, the hackerverse was full of “vibe coding”. If you’re not caught up on your AI buzzwords, this is the catchy name coined by [Andrej Karpathy] that refers to …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/vibing-ai-style/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/vibing</span><span class="invisible">-ai-style/</span></a></p>
Hackaday<p>Will it Run Llama 2? Now DOS Can</p><p>Will a 486 run Crysis? No, of course not. Will it run a large language model (LLM)? Given the huge buildout of compute power to do just that, many people …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/will-it-run-llama-2-now-dos-can/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/will-i</span><span class="invisible">t-run-llama-2-now-dos-can/</span></a></p>
Hackaday<p>Open Source DMR Radio</p><p>While ham radio operators have been embracing digital mobile radio (DMR), the equipment is most often bought since — at least in early incarnations — it needs a proprietary CODEC …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/19/open-source-dmr-radio/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/19/open-s</span><span class="invisible">ource-dmr-radio/</span></a></p>
Aktion Freiheit statt Angst<p>Erfundene Identitäten<br>Wachsender Betrug im Onlinehandel<br> Mehr dazu bei <a href="https://www.stern.de/wirtschaft/news/cyberkriminalitaet--online-betrug--steigende-schaeden-durch-falsche-kunden-35644660.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stern.de/wirtschaft/news/cyber</span><span class="invisible">kriminalitaet--online-betrug--steigende-schaeden-durch-falsche-kunden-35644660.html</span></a><br>a-fsa.de/d/3GD<br>Link zu dieser Seite: <a href="https://www.aktion-freiheitstattangst.org/de/articles/9127-20250419-erfundene-identitaeten.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">aktion-freiheitstattangst.org/</span><span class="invisible">de/articles/9127-20250419-erfundene-identitaeten.html</span></a><br>Link im Tor-Netzwerk: <a href="http://a6pdp5vmmw4zm5tifrc3qo2pyz7mvnk4zzimpesnckvzinubzmioddad.onion/de/articles/9127-20250419-erfundene-identitaeten.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="ellipsis">a6pdp5vmmw4zm5tifrc3qo2pyz7mvn</span><span class="invisible">k4zzimpesnckvzinubzmioddad.onion/de/articles/9127-20250419-erfundene-identitaeten.html</span></a><br>Tags: <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/ErfundeneIdentit%C3%A4ten" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ErfundeneIdentitäten</span></a> <a href="https://mastodon.social/tags/Betrug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Betrug</span></a> <a href="https://mastodon.social/tags/Onlinehandel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Onlinehandel</span></a> <a href="https://mastodon.social/tags/Datenskandale" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenskandale</span></a> <a href="https://mastodon.social/tags/Verbraucherdatenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Verbraucherdatenschutz</span></a> <a href="https://mastodon.social/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datenschutz</span></a> <a href="https://mastodon.social/tags/Datensicherheit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Datensicherheit</span></a> <a href="https://mastodon.social/tags/Transparenz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Transparenz</span></a> <a href="https://mastodon.social/tags/Identit%C3%A4tspr%C3%BCfung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Identitätsprüfung</span></a></p>
Hackaday<p>Restoring an Abandoned Game Boy Kiosk</p><p>Back in the olden days, there existed physical game stores, which in addition to physical games would also have kiosks where you could try out the current game consoles and …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/18/restoring-an-abandoned-game-boy-kiosk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/18/restor</span><span class="invisible">ing-an-abandoned-game-boy-kiosk/</span></a></p>
Hackaday<p>Haircuts in Space: How to Keep Your Astronauts Looking Fresh</p><p>Although we tend to see mostly the glorious and fun parts of hanging out in a space station, the human body will not cease to do its usual things, whether …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/18/haircuts-in-space-how-to-keep-your-astronauts-looking-fresh/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/18/haircu</span><span class="invisible">ts-in-space-how-to-keep-your-astronauts-looking-fresh/</span></a></p>
Pyrzout :vm:<p>ASUS routers with AiCloud vulnerable to auth bypass exploit – Source: securityaffairs.com <a href="https://ciso2ciso.com/asus-routers-with-aicloud-vulnerable-to-auth-bypass-exploit-source-securityaffairs-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/asus-routers-wit</span><span class="invisible">h-aicloud-vulnerable-to-auth-bypass-exploit-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/AuthenticationBypassVulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AuthenticationBypassVulnerability</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://social.skynetcloud.site/tags/ASUS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ASUS</span></a></p>
Pyrzout :vm:<p>Entertainment venue management firm Legends International disclosed a data breach – Source: securityaffairs.com <a href="https://ciso2ciso.com/entertainment-venue-management-firm-legends-international-disclosed-a-data-breach-source-securityaffairs-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/entertainment-ve</span><span class="invisible">nue-management-firm-legends-international-disclosed-a-data-breach-source-securityaffairs-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/informationsecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecuritynews</span></a> <a href="https://social.skynetcloud.site/tags/ITInformationSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITInformationSecurity</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairscom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairscom</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/PierluigiPaganini" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PierluigiPaganini</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/SecurityAffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityAffairs</span></a> <a href="https://social.skynetcloud.site/tags/BreakingNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BreakingNews</span></a> <a href="https://social.skynetcloud.site/tags/SecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/hackingnews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hackingnews</span></a> <a href="https://social.skynetcloud.site/tags/Cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybercrime</span></a> <a href="https://social.skynetcloud.site/tags/DataBreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreach</span></a> <a href="https://social.skynetcloud.site/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Hackaday<p>Robot Picks Fruit and Changes Light Bulbs with Measuring Tape</p><p>How far can you stretch a measuring tape before it buckles? The answer probably depends more on the tape than the user, but it does show how sturdy the coiled …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/18/robot-picks-fruit-and-changes-light-bulbs-with-measuring-tape/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/18/robot-</span><span class="invisible">picks-fruit-and-changes-light-bulbs-with-measuring-tape/</span></a></p>
Hackaday<p>A Pi-Based LiDAR Scanner</p><p>Although there are plenty of methods for effectively imaging a 3D space, LiDAR is widely regarded as one of the most effective methods. These systems use a rapid succession of …read more<br><a href="https://masto.ai/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://masto.ai/tags/projects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>projects</span></a><br><a href="https://hackaday.com/2025/04/18/a-pi-based-lidar-scanner/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/18/a-pi-b</span><span class="invisible">ased-lidar-scanner/</span></a></p>